Acknowledgement
This work was supported by Incheon National University (International Cooperative) Research Grant in 2021.
References
- M. E. Smid, "Development of the advanced encryption standard," J. Res. Natl. Inst. Stand. Technol. 126, 126024 (2021).
- S. Keller, "Modes of operation validation system for the triple data encryption algorithm (TMOVS): Requirements and procedures," American National Standards Institute, ANSI X9.52-1998 (1998).
- C.-W. Cheng, M. H. Cantu, and S. Kumar, "Analyzing computational components of standard block encryption schemes," J. Comput. Commun. 10, 81-89 (2022).
- W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photonics 6, 120-155 (2014). https://doi.org/10.1364/AOP.6.000120
- S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014). https://doi.org/10.1016/j.optlastec.2013.05.023
- B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt. 18, 83001 (2016).
- B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
- E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000). https://doi.org/10.1364/AO.39.006595
- M.-T. Shiu, Y.-K. Chew, H.-T. Chan, X.-Y. Wong, and C.-C. Chang, "Three-dimensional information encryption and anti-counterfeiting using digital holography," Appl. Opt. 54, A84-A88 (2015). https://doi.org/10.1364/AO.54.000A84
- E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
- L.-Z. Cai, M.-Z. He, Q. Liu, and X.-L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
- X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- H. Li, "Image encryption based on gyrator transform and twostep phase-shifting interferometry," Opt. Laser Eng. 47, 45-50 (2009). https://doi.org/10.1016/j.optlaseng.2008.08.001
- S.-H. Jeon and S.-K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
- D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013). https://doi.org/10.1016/j.optcom.2013.06.044
- S. H. Jeon and S. K. Gil, "Optical implementation of triple DES algorithm based on dual XOR logic operations," J. Opt. Soc. Korea 17, 362-370 (2013). https://doi.org/10.3807/JOSK.2013.17.5.362
- E. Ahouzi, W. Zamrani, N. Azami, A. Lizana, J. Campos, and M. Yzuel, "Optical triple random-phase encryption," Opt. Eng. 56, 113114 (2017).
- E. Kumari, P. Singh, S. Mukherjee, and G. N. Purohit, "Analysis of triple random phase encoding cryptosystem in Fresnel domain," Result Opt. 1, 100009 (2020).
- Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008). https://doi.org/10.1364/OL.33.002443
- S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354